Polymorphic computational system and method in signals intelligence analysis

a computational system and signal intelligence technology, applied in the field of reconfigurable computing platforms, can solve the problems of not having the time or ability to do such coding, requiring significant amounts of time to write, and not reaching the full potential of this technology

Active Publication Date: 2008-06-10
SIEMENS PROD LIFECYCLE MANAGEMENT SOFTWARE INC
View PDF35 Cites 91 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the emulator has gained wide acceptance in certain fields (specifically electronic design automation), the full potential for this technology has not yet been reached.
This is partly due to the complexity and difficulty in writing the programs and download files that are necessary for configuring an emulator—those outside of the circuit design art have, until now, simply avoided using the emulator for tasks other than hardware functional and performance verification.
Writing typical computer programs or download files for an emulator takes special skill in computer programming and logic synthesis (such as knowledge of various hardware description languages such as Verilog, Verilog Hardware Description Language (VHDL) and / or Register Transfer Logic (RTL)), and may require significant amounts of time to write.
Many of us, cryptographers included, simply may not have the time or ability to do such coding.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Polymorphic computational system and method in signals intelligence analysis
  • Polymorphic computational system and method in signals intelligence analysis
  • Polymorphic computational system and method in signals intelligence analysis

Examples

Experimental program
Comparison scheme
Effect test

example

SIA-Imagery

[0267]Signals intelligence analysis, and the solutions and solution fragments described above, are not limited to encryption / decryption. Indeed, they may extend to any other area in which incoming data is reviewed for the existence of a pattern. The incoming data may be, for example, a stream of satellite imagery containing pictures of suspected military equipment in opposition forces territory. With the abundance of satellites and other forms of information-gathering equipment, millions of digital images may be generated every hour. The traditional approach to SIA would transmit such images to a centralized location for analysis. The traditional approach uses a centralized location partly because it is easier to keep a central location secure. This centralized approach suffers a drawback, however, in that the time required for the transmission and central analysis may literally mean the difference between life and death. A satellite image showing an advancing troop trans...

example embodiment

Abstraction and Behavioral Models

[0276]FIG. 19 illustrates a flow diagram for another example embodiment and use of the present invention. The power and ease-of-use offered by various embodiments described above enable the simulation and modeling of various computational problems. For example, in step 1901, a user may define a computational model and its boundaries. Computational models are common throughout the research community, and are used to define a near-infinite variety of behaviors such as planetary orbits, gene sequencing, thermal conductivity, etc. For ease of explanation, the present discussion will use the following simplified computational model (although it will be understood that the teachings described herein may be applied to any computational model):

[0277]∫0π⁢sin⁡(x+41)

[0278]The boundaries for a computational model represent the outer limits for the variables appearing in the computational model. In the illustrated example, the model is bounded by defining the val...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Configuration software is used for generating hardware-level code and data that may be used with reconfigurable / polymorphic computing platforms, such as logic emulators, and which may be used for conducting signals intelligence analysis, such as encryption / decryption processing, image analysis, etc. A user may use development tools to create visual representations of desired process algorithms, data structures, and interconnections, and system may generate intermediate data from this visual representation. The Intermediate data may be used to consult a database of predefined code segments, and segments may be assembled to generate monolithic block of hardware syhthesizable (RTL, VHDL, etc.) code for implementing the user's process in hardware. Efficiencies may be accounted for to minimize circuit components or processing time. Floating point calculations may be supported by a defined data structure that is readily implemented in hardware.

Description

[0001]The present application claims priority, under 35 U.S.C. 119(e), to U.S. provisional application Ser. No. 60 / 407,703, entitled “A Device, Methodology and Development Environment for the Modeling of Physical Phenomena Within a Reconfigurable Computational Platform,” filed Sep. 4, 2002, and U.S. provisional application Ser. No. 60 / 407,702, entitled “A Device, Methodology and Application Development for Signals Intelligence Using a Reconfigurable Computational Platform,” filed Sep. 4, 2002, the disclosures of which are both hereby incorporated by reference.[0002]A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.FIELD OF THE INVENTION[0003]The present invention relates ge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F9/44G06F9/45G06FG06F9/455G06F15/16G06F15/177G06F17/50
CPCG06F17/5027G06F30/331
Inventor GRANNY, NICOLA V.BRISUDOVA, MARTINA M.
Owner SIEMENS PROD LIFECYCLE MANAGEMENT SOFTWARE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products